Zobrazeno 1 - 10
of 165
pro vyhledávání: '"Ben Soh"'
Publikováno v:
Information, Vol 15, Iss 11, p 738 (2024)
Educational Data Mining (EDM) applies advanced data mining techniques to analyse data from educational settings, traditionally aimed at improving student performance. However, EDM’s potential extends to enhancing administrative functions in educati
Externí odkaz:
https://doaj.org/article/560a584d33c9411d92efef4f1cc9f1e1
Autor:
Saad Alghamdi, Ben Soh La
Publikováno v:
Proceedings on Engineering Sciences, Vol 17, Iss 4, Pp 767-780 (2023)
This study assesses the adoption of Massive Open Online Courses (MOOCs) by Saudi students in Australian universities, exploring its potential impact on achieving Saudi Vision 2030 goals. Utilizing the Technology Acceptance Model, integrated with Pers
Externí odkaz:
https://doaj.org/article/a58fb06d37714ae3a899140b69f19f9c
Using ML to Predict User Satisfaction with ICT Technology for Educational Institution Administration
Publikováno v:
Information, Vol 15, Iss 4, p 218 (2024)
Effective and efficient use of information and communication technology (ICT) systems in the administration of educational organisations is crucial to optimise their performance. Earlier research on the identification and analysis of ICT users’ sat
Externí odkaz:
https://doaj.org/article/608d0fde01d84ec185298c134bbe183b
Publikováno v:
Future Internet, Vol 16, Iss 3, p 93 (2024)
The advent of the Internet of Things (IoT) has revolutionised our interaction with the environment, facilitating seamless connections among sensors, actuators, and humans. Efficient task scheduling stands as a cornerstone in maximising resource utili
Externí odkaz:
https://doaj.org/article/e05dd08dcd3048958e87b328b52cb8f5
Autor:
Vyas O’Neill, Ben Soh
Publikováno v:
Algorithms, Vol 16, Iss 10, p 454 (2023)
The Internet of Things (IoT) is growing rapidly in various domains, including smart city applications. In many cases, IoT data in smart city applications have time constraints in which they are relevant and acceptable to the task at hand—a window o
Externí odkaz:
https://doaj.org/article/78551527436a4fab94ef7cc3c7e6f315
Autor:
Vyas O’Neill, Ben Soh
Publikováno v:
Future Internet, Vol 15, Iss 9, p 288 (2023)
Cloud computing has become ubiquitous in the enterprise environment as its on-demand model realizes technical and economic benefits for users. Cloud users demand a level of reliability, availability, and quality of service. Improvements to reliabilit
Externí odkaz:
https://doaj.org/article/e64861a6cf51408897d512cd03e1bc45
Publikováno v:
Sensors, Vol 23, Iss 16, p 7286 (2023)
In the realm of the Internet of Things (IoT), a network of sensors and actuators collaborates to fulfill specific tasks. As the demand for IoT networks continues to rise, it becomes crucial to ensure the stability of this technology and adapt it for
Externí odkaz:
https://doaj.org/article/92d0c7d171354c12bb7bb4839d60d37d
Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications
Autor:
Osama S. Faragallah, Ashraf Afifi, Walid El-Shafai, Hala S. El-Sayed, Ensherah A. Naeem, Mohammed A. Alzain, Jehad F. Al-Amri, Ben Soh, Fathi E. Abd El-Samie
Publikováno v:
IEEE Access, Vol 8, Pp 42491-42503 (2020)
The need for cybersecurity increases to protect the exchange of information for improving the data privacy. This paper presents an investigation of the encryption efficiency of the chaotic-based image block ciphering in the spatial and Fractional Fou
Externí odkaz:
https://doaj.org/article/f6b4e08fe4d849f79eadeaa442751309
Autor:
Osama S. Faragallah, Mohammed A. Alzain, Hala S. El-Sayed, Jehad F. Al-Amri, Walid El-Shafai, Ashraf Afifi, Ensherah A. Naeem, Ben Soh
Publikováno v:
IEEE Access, Vol 7, Pp 4184-4194 (2019)
This paper investigates and presents a block-based opto-color cipher using double random phase encoding (DRPE) with different block sizes. The color plainimage is divided into equal-sized blocks and then converted to an optical signal by an optical e
Externí odkaz:
https://doaj.org/article/78ee660454314a2fa6c9e5657030ff3a
Publikováno v:
IEEE Access, Vol 7, Pp 168337-168356 (2019)
The increased use of radio frequency identification (RFID) technology has made it difficult to maintain secure operations in RFID environments. In addition, establishing a secure system when the internet is unavailable and finding a secure method to
Externí odkaz:
https://doaj.org/article/064a81546e8c4e79a3a900070f438d3f